官术网_书友最值得收藏!

Sample questions

Q1. Which one of the following statements about security standards reflect the most appropriate definition?

  1. Security standards are step-by-step instructions to implement a security policy
  2. Security standards contains prescriptive statements, control objectives, and controls for implementing security
  3. Security standards document best practices
  4. Security standards are technology specific blue print diagrams

Q2. Security breach laws typically have provisions regarding who must comply with the law and additional applicable provisions. Which one of the following may not be an applicable provision?

  1. Definitions of personnel information
  2. Exemptions
  3. What constitutes a breach
  4. Requirements for certification

Q3. Which statements, among the following are published by (ISC)2 in the Code of professional ethics (this is a drag and drop type of question. Here you can draw a line from the list of answers from the left to the empty box on the right-hand side)?

Q4. A security practitioner is evaluating a privacy breach scenario for an ecommerce order placement and process setup. Choose a location where a possible privacy security breach could happen due to insecure implementation (this is a hot spot type of question. Place a tick mark in the appropriate circle).

主站蜘蛛池模板: 寿光市| 鄢陵县| 丹巴县| 定南县| 安徽省| 丰台区| 宿松县| 夏邑县| 西华县| 博湖县| 连平县| 珲春市| 布拖县| 高邮市| 海口市| 乐业县| 广汉市| 长岛县| 高阳县| 靖安县| 开鲁县| 高要市| 五家渠市| 横峰县| 宜宾市| 浦县| 伊川县| 沙雅县| 克拉玛依市| 海盐县| 尼木县| 城步| 穆棱市| 湖南省| 绥芬河市| 嘉善县| 台南县| 米泉市| 丹江口市| 沁源县| 兴山县|